On Thu, Oct 20, 2016 at 7:44 PM, Martin Thomson
<martin.thom...@gmail.com> wrote:
> On 21 October 2016 at 10:37, Trevor Perrin <tr...@trevp.net> wrote:
>> I'm happy to announce that a spec for the "XEd25519" signature
>> algorithm used in Signal is available at [1].
>
>
> One comment: the document doesn't really explain why you might want to
> use X- or VX-prefixed variants over the deterministic base algorithms
> (the benefits of which have many words spilled over).


There's some rationales sprinkled throughout, though I guess it's
light on that.  We'll probably discuss design and rationales more on
curves list.

As far as deterministic vs randomized algorithms, that's discussed in Section 8.

Determinism is somewhat of a red herring.  To protect the private key
it's important that different hash "challenges" (h) get different
nonces (r).  Hashing the message into the computation of h and r helps
with this.

However, it's not important that the same h gets the same r.  Adding
randomization on top of hashing adds some resilience against glitching
and side-channel attacks.

If it's important that the same (message, public key) can only give
one output, then you want a VRF.

Trevor
_______________________________________________
Messaging mailing list
Messaging@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to